Framed for Child Porn by a PC Virus

Discussion in 'News / Current Events' started by Revmitchell, Nov 10, 2009.

  1. Revmitchell

    Revmitchell
    Expand Collapse
    Well-Known Member

    Joined:
    Feb 18, 2006
    Messages:
    38,273
    Likes Received:
    777
    Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography.

    Heinous pictures and videos can be deposited on computers by viruses — the malicious programs better known for swiping your credit card numbers. In this twist, it's your reputation that's stolen.

    Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they'll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites.

    Whatever the motivation, you get child porn on your computer — and might not realize it until police knock at your door.

    More Here
     
  2. Baptist Believer

    Baptist Believer
    Expand Collapse
    Well-Known Member

    Joined:
    Jun 20, 2002
    Messages:
    6,647
    Likes Received:
    187
    A few things to note here:

    1.) Protect your computer. Run anti-virus software (if you decide to use Windows) and stay away from questionable sites on the internet.

    2.) Consider not using Windows at all. Those of us who use Mac OS X don't have many security worries as those who tied themselves to Microsoft products. In the 10 years I have used a Macintosh, I have had no viruses and haven't felt the need to run virus protection because my operating system is tightly locked down.

    3.) The FBI and other knowledgeable law enforcement agencies know about these viruses and remote storage. I have a friend who investigated child porn cases as a computer examiner for the FBI for most of a decade, and they can tell what was placed there remotely and what was collected by a user. However, your local authorities may not have that expertise.

    4.) Tightly secure your home wireless network!! There are too many cases where a next-door neighbor (especially in an apartment building) has piggy-backed onto another person's wireless network to commit computer crime. The FBI (and other agencies) have kicked in the wrong door more than a few times to catch bad guys only to discover that the computers in the home are not the one's used in the offense. There's no real way for authorities to tell the difference until they get access to the systems. It gets cleared up within a day or two, but the real bad guys get plenty of warning that the authorities have discovered their crimes, and you get to repair your door, your reputation, and your piece of mind.
     
  3. Trotter

    Trotter
    Expand Collapse
    <img src =/6412.jpg>

    Joined:
    Jun 29, 2003
    Messages:
    4,815
    Likes Received:
    0
    Most definitely. If you are not behind a router with a but-in firewall, use a software firewall, as well.

    Windows is the most targeted because it has the largest market share. Apple's "security through obscurity" is not any real protection, and OSX is only for Apple hardware. Linux is another possibility, but it has not progressed to the point that someone without knowledge of computers and operating systems could install and use it.

    There are now viruses in the wild that target Apple so you may want to see about making sure you are protected.

    Very true. The problem with this virus and others like it is that the images are not placed remotely, but are accessed directly from the computer. The virus will access them much faster than humanly possible, but it will still look exactly like someone was doing it from your computer because that is where the activity will originate.

    Amen and AMEN!!! The authorities will only have an IP address to go on. The Internet service provider will be able to tell the authorities who was using that IP address and will give them your address. This also goes for file-sharing. The RIAA/MPAA go by IP address alone. While I live out in the country, I discovered that someone was trying to piggyback on my wireless signal; a few seconds is all it took to set encryption up and cut them off.
     
  4. billwald

    billwald
    Expand Collapse
    Banned

    Joined:
    Jun 28, 2000
    Messages:
    11,414
    Likes Received:
    0
    "In 2007, Fiola's bosses became suspicious after the Internet bill for his state-issued laptop showed that he used 4 1/2 times more data than his colleagues. A technician found child porn in the PC folder that stores images viewed online."

    Moral: don't use a state-issued computer for personal stuff. What kind of government business requires a large amount of stored images viewed on line? Apparently this stuff was in a normal file and Fiola should have noticed.
     
  5. sag38

    sag38
    Expand Collapse
    Active Member

    Joined:
    Jan 26, 2008
    Messages:
    4,394
    Likes Received:
    1
    Hope it doesn't happen to you bill. Then we will sit around and wonder why you weren't smart enough to notice it on your computer.
     
  6. Paul3144

    Paul3144
    Expand Collapse
    Active Member

    Joined:
    May 29, 2009
    Messages:
    2,378
    Likes Received:
    0
    I'm normally a Mac guy, but I've been running Ubuntu Linux these past few weeks on my MacBook. It's a very good OS; it just has some compatability issues with Windows programs. It's also very easy to install or run off of a live CD.
     
  7. Gene Hawks

    Gene Hawks
    Expand Collapse
    New Member

    Joined:
    Jan 10, 2006
    Messages:
    7
    Likes Received:
    0
    Another thing to consider is that members of your family and circle of friends can get into things on the net that you'd never suspect and not even know it's there. I have a security program that specializes in detecting Porn (I have a 15yr old Son) if anyone is interested contact me at [email protected] and I'll send you a link where you can scan your computer for free.
     
  8. JohnDeereFan

    JohnDeereFan
    Expand Collapse
    Active Member

    Joined:
    Mar 26, 2009
    Messages:
    4,628
    Likes Received:
    11
    I'm guilty of this. I use a church-issued laptop for some personal things as well (nothing incriminating, just itunes and things like that).

    We really don't have any kind of policy about this and I don't see a problem with it, but maybe I should rethink that.
     

Share This Page

Loading...